University of Surrey

Test tubes in the lab Research in the ATI Dance Research

Delegation of Decryption Rights With Revocability From Learning With Errors

Yin, Wei, Wen, Qiaoyan, Liang, Kaitai, Zhang, Zhenfei, Chen, Liqun, Yan, Hanbing and Zhang, Hua (2018) Delegation of Decryption Rights With Revocability From Learning With Errors IEEE Access, 6. pp. 61163-61175.

08486948.pdf - Version of Record

Download (5MB) | Preview


The notion of decryption rights delegation was initially introduced by Blaze et al. in EUROCRYPT 1998. It, defined as proxy re-encryption, allows a semi-trusted proxy to convert a ciphertext intended for a party to another ciphertext of the same plaintext, without knowledge of the underlying plaintext and decryption key. It has been explored to many real-world applications, e.g., encrypted email forwarding. However, the intrinsic all-or-nothing share feature of proxy re-encryption yields a limitation that the share cannot be revoked. This may hinder the scalability of its applications in practice. In this paper, for the first time, we define the concept of revocability in terms of decryption rights delegation. The novel concept enables data owner to revoke the shared decryption rights when needed. Inspired by the seminal lattice-based proxy re-encryption proposed in PKC 2014, we design a concrete lattice-based construction which satisfies the notion. In our construction, we make use of binary-tree structure to implement the revocation of decryption rights, so that the update of re-encryption key is reduced to O(logN) (instead of O(N)), where N is the maximum number of delegatee. Furthermore, the security of our scheme is based on the standard learning with errors problem (LWE problem), which could be reduced to the worst-case hard problems (such as GapSVP and SIVP) in the context of lattices. The scheme is chosen ciphertext secure in the standard model. As of independent interest, our scheme achieves both backward and forward security, which means that once a user is revoked after a time period t, it cannot gain access to all encrypted files before and after t.

Item Type: Article
Divisions : Faculty of Engineering and Physical Sciences > Computer Science
Authors :
Wen, Qiaoyan
Zhang, Zhenfei
Yan, Hanbing
Zhang, Hua
Date : 9 October 2018
DOI : 10.1109/ACCESS.2018.2875069
Copyright Disclaimer : © 2019 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See for more information.
Uncontrolled Keywords : Revocability; Proxy re-encryption; Lattice; Learning with errors; Cryptography; Electronic mail; Standards; Copyright protection; Complexity theory; Lattices
Depositing User : Clive Harris
Date Deposited : 23 Sep 2019 12:32
Last Modified : 23 Sep 2019 12:32

Actions (login required)

View Item View Item


Downloads per month over past year

Information about this web site

© The University of Surrey, Guildford, Surrey, GU2 7XH, United Kingdom.
+44 (0)1483 300800